Skip to content

Commit 07ddb01

Browse files
committed
Fixed PR review blocking issues
1 parent 7f63d9a commit 07ddb01

File tree

2 files changed

+5
-4
lines changed

2 files changed

+5
-4
lines changed

articles/sentinel/add-advanced-conditions-to-automation-rules.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -72,9 +72,9 @@ In this first example, we'll create a simple condition group: If either conditio
7272

7373
1. Let's decide what these conditions will be. That is, what two *different* conditions will cause the incident severity to be changed to *High*? Let's suggest the following:
7474

75-
1. If the incident's associated MITRE ATT&CK **Tactics** include any of the four we've selected from the drop-down (see the image below), the severity should be raised to High.
75+
- If the incident's associated MITRE ATT&CK **Tactics** include any of the four we've selected from the drop-down (see the image below), the severity should be raised to High.
7676

77-
1. If the incident contains a **Host name** entity named "SUPER_SECURE_STATION", the severity should be raised to High.
77+
- If the incident contains a **Host name** entity named "SUPER_SECURE_STATION", the severity should be raised to High.
7878

7979
:::image type="content" source="media/add-advanced-conditions-to-automation-rules/add-simple-or-condition.png" alt-text="Screenshot of adding simple OR conditions to an automation rule.":::
8080

@@ -128,4 +128,4 @@ In this document, you learned how to add condition groups using `OR` operators t
128128
- For instructions on creating basic automation rules, see [Create and use Microsoft Sentinel automation rules to manage response](create-manage-use-automation-rules.md).
129129
- To learn more about automation rules, see [Automate incident handling in Microsoft Sentinel with automation rules](automate-incident-handling-with-automation-rules.md)
130130
- To learn more about advanced automation options, see [Automate threat response with playbooks in Microsoft Sentinel](automate-responses-with-playbooks.md).
131-
- For help in implementing automation rules and playbooks, see [Tutorial: Use playbooks to automate threat responses in Microsoft Sentinel](tutorial-respond-threats-playbook.md).
131+
- For help with implementing automation rules and playbooks, see [Tutorial: Use playbooks to automate threat responses in Microsoft Sentinel](tutorial-respond-threats-playbook.md).

articles/sentinel/create-manage-use-automation-rules.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -135,7 +135,8 @@ To add a condition based on a custom detail, take the following steps:
135135

136136
:::image type="content" source="media/create-manage-use-automation-rules/custom-detail-key-condition.png" alt-text="Screenshot of adding a custom detail key as a condition.":::
137137

138-
1. You've now chosen the field you want to evaluate for this condition. Now you have to specify the value appearing in that field that will make this condition evaluate to *true*.<br>Select **+ Add item condition**.
138+
1. You've now chosen the field you want to evaluate for this condition. Now you have to specify the value appearing in that field that will make this condition evaluate to *true*.
139+
Select **+ Add item condition**.
139140

140141
:::image type="content" source="media/create-manage-use-automation-rules/add-item-condition.png" alt-text="Screenshot of selecting add item condition for automation rules.":::
141142

0 commit comments

Comments
 (0)